Linkedin Mail RSS Skype Telegram Twitter WhatsApp
  • Quantum
  • AI
  • AI Security
  • Society 5.0
  • Cyber-Kinetic
  • 5G
  • Smart Cities
  • Blockchain & Crypto
  • Other
Search
Marin Ivezic Marin Ivezic Marin Ivezic
  • Quantum
  • AI
  • AI Security
  • Society 5.0
  • Cyber-Kinetic
  • 5G
  • Smart Cities
  • Blockchain & Crypto
  • Other
Linkedin Mail RSS Skype Telegram Twitter WhatsApp
  • Home
  • About
  • My Books
    • Securing Society 5.0
    • The Future of Leadership in the Age of AI
    • Crypto & Blockchain Security
    • Cyber-Kinetic Security
  • Resources
    • Internet of Things (IoT) Wireless Protocols
    • Emerging Tech Security Guidelines, Frameworks, Standards
    • Timeline of Key Cyber-Kinetic Attacks, Incidents & Research
  • Contact
Sign in
Welcome! Log into your account
Forgot your password? Get help
Password recovery
Recover your password
A password will be e-mailed to you.
Home Untargeted Attack - Harrisburg, Pennsylvania, Water Filtration Plant Hack

    Untargeted Attack – Harrisburg, Pennsylvania, Water Filtration Plant Hack

    By
    Marin Ivezic
    -
    November 19, 2017
    Water-Treatment-Plant Cyber-Kinetic

    A hacker gained control of sensitive systems but, fortunately, did not realize what he had gained control of. He used the network that controlled the systems merely to send spam emails.

    Water-Treatment-Plant Cyber-Kinetic
    Previous articleMalfunction – Browns Ferry Nuclear Plant
    Next articleTargeted Attack – Los Angeles Traffic System Attack
    Marin Ivezic
    Marin Ivezic
    ABOUT US
    Marin Ivezic's personal blog with guest contributors on security, safety, privacy and controllability of emerging technologies such as AI, IoT, Blockchain, Metaverse, and others.
    FOLLOW US
    Linkedin Mail RSS Skype Telegram Twitter WhatsApp
    • Home
    • About
    • My Books
      • Securing Society 5.0
      • The Future of Leadership in the Age of AI
      • Crypto & Blockchain Security
      • Cyber-Kinetic Security
    • Resources
      • Internet of Things (IoT) Wireless Protocols
      • Emerging Tech Security Guidelines, Frameworks, Standards
      • Timeline of Key Cyber-Kinetic Attacks, Incidents & Research
    • Contact
    © Marin Ivezic | Terms of Use | Privacy Policy